Publication | Open Access
Unconditional Security From Noisy Quantum Storage
161
Citations
44
References
2012
Year
Cryptographic PrimitiveEngineeringInformation SecurityHardware SecurityQuantum ComputingPost-quantum CryptographyQuantum EntanglementTwo-party Cryptographic PrimitivesQuantum Key DistributionQuantum ScienceQuantum CryptographyQuantum SecurityQuantum StoragePhysicsComputer ScienceData SecurityCryptographyOblivious TransferNatural SciencesQuantum Error Correction
We consider the implementation of two-party cryptographic primitives based on the sole assumption that no large-scale reliable quantum storage is available to the cheating party. We construct novel protocols for oblivious transfer and bit commitment, and prove that realistic noise levels provide security even against the most general attack. Such unconditional results were previously only known in the so-called bounded-storage model which is a special case of our setting. Our protocols can be implemented with present-day hardware used for quantum key distribution. In particular, no quantum storage is required for the honest parties.
| Year | Citations | |
|---|---|---|
Page 1
Page 1